SlideShare ist ein Scribd-Unternehmen logo
1 von 41
splunk> Overview



  Your Guide
    David Lutz
splunk> Lunch’n Learn Agenda

  splunk> Overview                        splunk> Public Assets
 · What is splunk>?                       · Splunkbase (splunk> repository of
 · Use cases                              over 200 free applications)
 · Architecture                           · Answers – community-driven Q&A
 Using splunk>                            · Online Documentation
 · Installation and setup (v4.3)          · Enterprise and Global Support
 · Adding data                            splunk> App demo
 · Search with keywords, boolean          · A demonstration of the splunk> for
 operators and statistical commands       Application Management App and
                                          more
 · Alerts, reports, and dashboards

Copyright © 2011, Splunk Inc.         2                       Listen to your data.
Agenda

What is Splunk? splunk> explained
    Searching, Alerting & Reporting
explained
        Universal Indexing explained
            Deployment Options explained
                 Demonstration
Copyright © 2011, Splunk Inc.     3      Listen to your data.
What is it?

Copyright © 2011, Splunk Inc.        4        Listen to your data.
Collects, indexes and harnesses your machine
         data to identify problems, patterns, risks and
          opportunities and drive better decisions for
                       IT and the business.

Copyright © 2011, Splunk Inc.   5              Listen to your data.
Wait. What?

Copyright © 2011, Splunk Inc.        6        Listen to your data.
splunk> is software
                splunk> creates a key : value index
                splunk> retains pristine copies of all data
                splunk> searches that index for data

Copyright © 2011, Splunk Inc.         7                Listen to your data.
splunk> is the engine for machine data
   No predefined schema, no custom connectors, no RDBMS, no need to filter/forward.

   Customer                                                                                                                       Outside the
  Facing Data                                                                                                                     Datacenter
Click-stream data                                                                                                              Manufacturing, logistic
Shopping cart data                                                                                                             s…
Online transaction                                                                                                             CDRs & IPDRs
data                                                                                                                           Power consumption
                                Logfiles   Configs Messages   Traps         Metrics   Scripts    Changes    Tickets            RFID data
                                                              Alerts                                                           GPS data


                                                   Virtualization
   Windows                Linux/Unix                                           Applications                Databases              Networking
                                                      & Cloud
 Registry                Configurations            Hypervisor                 Web logs                Configurations             Configurations
 Event logs              syslog                    Guest OS, Apps             Log4J, JMS, JMX         Audit/query logs           syslog
 File system             File system               Cloud                      .NET events             Tables                     SNMP
 sysinternals            ps, iostat, top                                      Code and scripts        Schemas                    netflow



Copyright © 2011, Splunk Inc.                                          11                                             Listen to your data.
splunk> eliminates finger pointing




Copyright © 2011, Splunk Inc.   13          Listen to your data.
What It’s Like In The Trenches



                          Application        Application             Systems            Application             Database
Service Desk               Support           Developer             Administrator        Developer             Administrator

 Log call. The          Java monitoring    Stop working on        Stop what they’re        Manual             DBA analyzes
 console says          tools don’t show      new code to           doing to identify    investigation        audit logs which
 everything is          anything either.    troubleshoot.             and gather       establishes not        points to bad
    green.                  Call the       Need production         production logs       application              query.
                           developer.           logs!               for developer.        problem.
  Escalate.                Escalate.         Escalate.               Respond.           Escalate.             Now what?

Copyright © 2011, Splunk Inc.                                14                                   Listen to your data.
Harnessing Your Machine Data
                                                                                                             Proactive




                      Search and    Investigate, find and fix problems dramatically
                      Investigate   faster across your organization

IT silo chaos
                                                                                                             Reactive

Copyright © 2011, Splunk Inc.                       15                                Listen to your data.
Harnessing Your Machine Data
                                                                                                             Proactive




                      Search and    Investigate, find and fix problems dramatically
                      Investigate   faster across your organization

IT silo chaos
                                                                                                             Reactive

Copyright © 2011, Splunk Inc.                       16                                Listen to your data.
Harnessing Your Machine Data
                                                                                                        Proactive




                                                      Automatically monitor to identify issues,
                                    Proactive
                                    Monitoring        problems and attacks before they
                                                      impact your customers and services
                      Search and
                      Investigate

IT silo chaos
                                                                                                        Reactive

Copyright © 2011, Splunk Inc.                    18                              Listen to your data.
Harnessing Your Machine Data
                                                                                                        Proactive




                                                      Automatically monitor to identify issues,
                                    Proactive
                                    Monitoring        problems and attacks before they
                                                      impact your customers and services
                      Search and
                      Investigate

IT silo chaos
                                                                                                        Reactive

Copyright © 2011, Splunk Inc.                    19                              Listen to your data.
Harnessing Your Machine Data
                                                                                                  Proactive




        Gain end-to-end visibility to track and deliver on   Operational
          IT KPIs and make better-informed IT decisions       Visibility

                                        Proactive
                                        Monitoring

                      Search and
                      Investigate

IT silo chaos
                                                                                                  Reactive

Copyright © 2011, Splunk Inc.                        21                    Listen to your data.
Harnessing Your Machine Data
                                                                                                  Proactive




        Gain end-to-end visibility to track and deliver on   Operational
          IT KPIs and make better-informed IT decisions       Visibility

                                        Proactive
                                        Monitoring

                      Search and
                      Investigate

IT silo chaos
                                                                                                  Reactive

Copyright © 2011, Splunk Inc.                        22                    Listen to your data.
Harnessing Your Machine Data
                                                                                                            Proactive

                                Gain real-time insight from operational data to      Real-time
                                      make better-informed business decisions     Business Insights

                                                               Operational
                                                                Visibility

                                         Proactive
                                         Monitoring

                      Search and
                      Investigate

IT silo chaos
                                                                                                            Reactive

Copyright © 2011, Splunk Inc.                         23                             Listen to your data.
Harnessing Your Machine Data
                                                                                                            Proactive

                                Gain real-time insight from operational data to      Real-time
                                      make better-informed business decisions     Business Insights

                                                               Operational
                                                                Visibility

                                         Proactive
                                         Monitoring

                      Search and
                      Investigate

IT silo chaos
                                                                                                            Reactive

Copyright © 2011, Splunk Inc.                         24                             Listen to your data.
splunk> Supports Diverse Apps/Solutions


                                                               CDR




    Security




                                IronPort WSA




Copyright © 2011, Splunk Inc.                  Listen to your data.
Universal Indexing
Universal Indexing Indexes Unstructured Data
                                 It’s that simple.


                                 key : value

 Copyright © 2011, Splunk Inc.          27           Listen to your data.
Universal Indexing Indexes Unstructured Data


                                 Every word
                                 Every value
                                 Every character
                                 … even punctuation
                                 … even white spaces

 Copyright © 2011, Splunk Inc.           28            Listen to your data.
New Approach to Heterogeneous Data
  Universal Indexing            Search-time Knowledge           Flexibility and
                                                              Fast Time to Value

• No data normalization          • Knowledge applied at      • Normalization as it’s
• Automatically handles            search-time                 needed
  timestamps                     • No brittle schema to      • Faster implementation
• Parsers not required             work around               • Easy search language
• Index every term &             • Multiple views into the   • Multiple views into the
  pattern “blindly”                same data                   same data
• No attempt to                  • Splunk helps find
  “understand” up front            transactions, patterns
                                   and trends


Copyright © 2011, Splunk Inc.                29                    Listen to your data.
Deployment Options
A splunk> Installation Has 4 Functions
                                Searching and Reporting (Search Head)

                                Indexing and Search Services (Indexer)

                                Data Collection and Forwarding (Forwarder)

                                Local and Distributed Management (Deployment Server)

                                A splunk> installation can be one or all of these …

Copyright © 2011, Splunk Inc.                    35                      Listen to your data.
Single splunk> Indexer

                             Get started with a single splunk> Indexer.
                  You can index, search, alert, report, correlate within 15 minutes.




                                   Send in syslog data        Pull in local data via File or Dir monitoring, WMI,
                                                                     and/or Scripted Inputs
Servers &
Desktops
                                                                                             Logs
                                                                                  Scripts
            Firewalls, Routers, Switches                                                            Messages

  Copyright © 2011, Splunk Inc.                          36                                 Listen to your data.
splunk> Indexer with Forwarders




splunk> Forwarders can be used to send data to your splunk> Indexer reliably and securely




 Copyright © 2011, Splunk Inc.             37                         Listen to your data.
splunk> Scales Across the Datacenter


                             Offload search with dedicated splunk> Search Head(s)




Auto load-balanced forwarding to as many splunk> Indexers as you need to index, up to TBs/day


                     Send data from 1,000s of servers using combination of splunk>
                  Forwarders, syslog, WMI, message queues, or other remote protocols
   Copyright © 2011, Splunk Inc.                       38                           Listen to your data.
splunk> Runs Across Datacenters


Distributed search unifies the
view across locations

Role-based access controls how
far a given user's search will span




  Copyright © 2011, Splunk Inc.       39     Listen to your data.
splunk> Scales to TBs/day and 1,000s of Users
      Distributed Search with MapReduce
      linearly scales search and reporting




 Automatic load
 balancing linearly
 scales indexing



 Copyright © 2011, Splunk Inc.           40   Listen to your data.
Demonstration
Executive and
Domain-level
Dashboards
Remember ‘Harnessing Your Machine Data’?
                                                                                                            Proactive

                                Gain real-time insight from operational data to      Real-time
                                      make better-informed business decisions     Business Insights

        Gain end-to-end visibility to track and deliver on     Operational
          IT KPIs and make better-informed IT decisions         Visibility




                                                                                                            Reactive

Copyright © 2011, Splunk Inc.                         45                             Listen to your data.
Harnessing Your Machine Data
                                                                                                            Proactive

                                Gain real-time insight from operational data to      Real-time
                                      make better-informed business decisions     Business Insights

                                                               Operational
                                                                Visibility

                                         Proactive
                                         Monitoring

                      Search and
                      Investigate

IT silo chaos
                                                                                                            Reactive

Copyright © 2011, Splunk Inc.                         46                             Listen to your data.
Harnessing Your Machine Data
                                                                                                  Proactive




        Gain end-to-end visibility to track and deliver on   Operational
          IT KPIs and make better-informed IT decisions       Visibility

                                        Proactive
                                        Monitoring

                      Search and
                      Investigate

IT silo chaos
                                                                                                  Reactive

Copyright © 2011, Splunk Inc.                        47                    Listen to your data.
Root Cause Analysis
Is There A
    Problem?




Copyright © 2011, Splunk Inc.   49   Listen to your data.
Where Is The Problem?




Copyright © 2011, Splunk Inc.             50            Listen to your data.
What Is The
  Problem?




Copyright © 2011, Splunk Inc.   51   Listen to your data.
Remember ‘Harnessing Your Machine Data’?
                                                                                                             Proactive




                      Search and    Investigate, find and fix problems dramatically
                      Investigate   faster across your organization

IT silo chaos
                                                                                                             Reactive

Copyright © 2011, Splunk Inc.                       52                                Listen to your data.
The IT Search Company


                                  email: dlux@splunk.com
                                 twitter: @dlux_at_splunk
                                skype: dluxatsplunkdotcom
                                                      Your Guide
                                                       David Lutz
Copyright © 2011, Splunk Inc.                                  Listen to your data.

Weitere ähnliche Inhalte

Was ist angesagt?

How to Design, Build and Map IT and Business Services in Splunk
How to Design, Build and Map IT and Business Services in SplunkHow to Design, Build and Map IT and Business Services in Splunk
How to Design, Build and Map IT and Business Services in SplunkSplunk
 
SplunkLive 2011 Beginners Session
SplunkLive 2011 Beginners SessionSplunkLive 2011 Beginners Session
SplunkLive 2011 Beginners SessionSplunk
 
Splunk Enterprise Security
Splunk Enterprise SecuritySplunk Enterprise Security
Splunk Enterprise SecuritySplunk
 
Splunk Overview
Splunk OverviewSplunk Overview
Splunk OverviewSplunk
 
Power of Splunk Search Processing Language (SPL)
Power of Splunk Search Processing Language (SPL)Power of Splunk Search Processing Language (SPL)
Power of Splunk Search Processing Language (SPL)Splunk
 
Splunk Architecture overview
Splunk Architecture overviewSplunk Architecture overview
Splunk Architecture overviewAlex Fok
 
Getting started with Splunk
Getting started with SplunkGetting started with Splunk
Getting started with SplunkSplunk
 
Splunk Cloud
Splunk CloudSplunk Cloud
Splunk CloudSplunk
 
Getting started with Splunk - Break out Session
Getting started with Splunk - Break out SessionGetting started with Splunk - Break out Session
Getting started with Splunk - Break out SessionGeorg Knon
 
Splunk for Enterprise Security and User Behavior Analytics
 Splunk for Enterprise Security and User Behavior Analytics Splunk for Enterprise Security and User Behavior Analytics
Splunk for Enterprise Security and User Behavior AnalyticsSplunk
 
Splunk Phantom SOAR Roundtable
Splunk Phantom SOAR RoundtableSplunk Phantom SOAR Roundtable
Splunk Phantom SOAR RoundtableSplunk
 
Machine Data 101 Hands-on
Machine Data 101 Hands-onMachine Data 101 Hands-on
Machine Data 101 Hands-onSplunk
 
Splunk Cloud and Splunk Enterprise 7.2
Splunk Cloud and Splunk Enterprise 7.2 Splunk Cloud and Splunk Enterprise 7.2
Splunk Cloud and Splunk Enterprise 7.2 Splunk
 
Splunk workshop-Machine Data 101
Splunk workshop-Machine Data 101Splunk workshop-Machine Data 101
Splunk workshop-Machine Data 101Splunk
 
Splunk Webinar: Full-Stack End-to-End SAP-Monitoring mit Splunk
Splunk Webinar: Full-Stack End-to-End SAP-Monitoring mit SplunkSplunk Webinar: Full-Stack End-to-End SAP-Monitoring mit Splunk
Splunk Webinar: Full-Stack End-to-End SAP-Monitoring mit SplunkSplunk
 
Exploring Frameworks of Splunk Enterprise Security
Exploring Frameworks of Splunk Enterprise SecurityExploring Frameworks of Splunk Enterprise Security
Exploring Frameworks of Splunk Enterprise SecuritySplunk
 
Splunk Dashboarding & Universal Vs. Heavy Forwarders
Splunk Dashboarding & Universal Vs. Heavy ForwardersSplunk Dashboarding & Universal Vs. Heavy Forwarders
Splunk Dashboarding & Universal Vs. Heavy ForwardersHarry McLaren
 

Was ist angesagt? (20)

How to Design, Build and Map IT and Business Services in Splunk
How to Design, Build and Map IT and Business Services in SplunkHow to Design, Build and Map IT and Business Services in Splunk
How to Design, Build and Map IT and Business Services in Splunk
 
SplunkLive 2011 Beginners Session
SplunkLive 2011 Beginners SessionSplunkLive 2011 Beginners Session
SplunkLive 2011 Beginners Session
 
Splunk Enterprise Security
Splunk Enterprise SecuritySplunk Enterprise Security
Splunk Enterprise Security
 
Splunk overview
Splunk overviewSplunk overview
Splunk overview
 
Splunk Overview
Splunk OverviewSplunk Overview
Splunk Overview
 
Power of Splunk Search Processing Language (SPL)
Power of Splunk Search Processing Language (SPL)Power of Splunk Search Processing Language (SPL)
Power of Splunk Search Processing Language (SPL)
 
Splunk Architecture overview
Splunk Architecture overviewSplunk Architecture overview
Splunk Architecture overview
 
Getting started with Splunk
Getting started with SplunkGetting started with Splunk
Getting started with Splunk
 
Splunk Cloud
Splunk CloudSplunk Cloud
Splunk Cloud
 
Getting started with Splunk - Break out Session
Getting started with Splunk - Break out SessionGetting started with Splunk - Break out Session
Getting started with Splunk - Break out Session
 
Splunk for Enterprise Security and User Behavior Analytics
 Splunk for Enterprise Security and User Behavior Analytics Splunk for Enterprise Security and User Behavior Analytics
Splunk for Enterprise Security and User Behavior Analytics
 
Splunk Phantom SOAR Roundtable
Splunk Phantom SOAR RoundtableSplunk Phantom SOAR Roundtable
Splunk Phantom SOAR Roundtable
 
Machine Data 101 Hands-on
Machine Data 101 Hands-onMachine Data 101 Hands-on
Machine Data 101 Hands-on
 
Introducing Splunk – The Big Data Engine
Introducing Splunk – The Big Data EngineIntroducing Splunk – The Big Data Engine
Introducing Splunk – The Big Data Engine
 
Splunk Cloud and Splunk Enterprise 7.2
Splunk Cloud and Splunk Enterprise 7.2 Splunk Cloud and Splunk Enterprise 7.2
Splunk Cloud and Splunk Enterprise 7.2
 
Splunk workshop-Machine Data 101
Splunk workshop-Machine Data 101Splunk workshop-Machine Data 101
Splunk workshop-Machine Data 101
 
Splunk Webinar: Full-Stack End-to-End SAP-Monitoring mit Splunk
Splunk Webinar: Full-Stack End-to-End SAP-Monitoring mit SplunkSplunk Webinar: Full-Stack End-to-End SAP-Monitoring mit Splunk
Splunk Webinar: Full-Stack End-to-End SAP-Monitoring mit Splunk
 
Exploring Frameworks of Splunk Enterprise Security
Exploring Frameworks of Splunk Enterprise SecurityExploring Frameworks of Splunk Enterprise Security
Exploring Frameworks of Splunk Enterprise Security
 
Splunk
SplunkSplunk
Splunk
 
Splunk Dashboarding & Universal Vs. Heavy Forwarders
Splunk Dashboarding & Universal Vs. Heavy ForwardersSplunk Dashboarding & Universal Vs. Heavy Forwarders
Splunk Dashboarding & Universal Vs. Heavy Forwarders
 

Ähnlich wie dlux - Splunk Technical Overview

SplunkLive: New Visibility=New Opportunity: How IT Can Drive Business Value
SplunkLive: New Visibility=New Opportunity: How IT Can Drive Business Value SplunkLive: New Visibility=New Opportunity: How IT Can Drive Business Value
SplunkLive: New Visibility=New Opportunity: How IT Can Drive Business Value Splunk
 
SplunkLive! Toronto - Ceryx
SplunkLive! Toronto - CeryxSplunkLive! Toronto - Ceryx
SplunkLive! Toronto - CeryxSplunk
 
SplunkLive! Detroit April 2013 - Domino's Pizza
SplunkLive! Detroit April 2013 - Domino's PizzaSplunkLive! Detroit April 2013 - Domino's Pizza
SplunkLive! Detroit April 2013 - Domino's PizzaSplunk
 
Splunk sales presentation
Splunk sales presentationSplunk sales presentation
Splunk sales presentationjpelletier123
 
How a Cloud Computing Provider Reached the Holy Grail of Visibility
How a Cloud Computing Provider Reached the Holy Grail of VisibilityHow a Cloud Computing Provider Reached the Holy Grail of Visibility
How a Cloud Computing Provider Reached the Holy Grail of Visibilityeladgotfrid
 
Splunk FISMA for Continuous Monitoring
Splunk FISMA for Continuous Monitoring Splunk FISMA for Continuous Monitoring
Splunk FISMA for Continuous Monitoring Greg Hanchin
 
Implementing Big Data at the Speed of Business
Implementing Big Data at the Speed of BusinessImplementing Big Data at the Speed of Business
Implementing Big Data at the Speed of BusinessDataWorks Summit
 
Don't Re-write Code to Get Better Analytics
Don't Re-write Code to Get Better AnalyticsDon't Re-write Code to Get Better Analytics
Don't Re-write Code to Get Better AnalyticsSplunk
 
dlux splunk>live! 2012 Beginners Session
dlux splunk>live! 2012 Beginners Sessiondlux splunk>live! 2012 Beginners Session
dlux splunk>live! 2012 Beginners SessionDavid Lutz
 
SplunkLive! Denver - Nov 2012 - Interac
SplunkLive! Denver - Nov 2012 - InteracSplunkLive! Denver - Nov 2012 - Interac
SplunkLive! Denver - Nov 2012 - InteracSplunk
 
Big Data launch keynote Singapore Patrick Buddenbaum
Big Data launch keynote Singapore Patrick BuddenbaumBig Data launch keynote Singapore Patrick Buddenbaum
Big Data launch keynote Singapore Patrick BuddenbaumIntelAPAC
 
Splunk at Expedia - Gartner Symposium
Splunk at Expedia - Gartner SymposiumSplunk at Expedia - Gartner Symposium
Splunk at Expedia - Gartner SymposiumEddie Satterly
 
Splunk @ Amazon Startup - Austin, TX - 9/11/2008
Splunk @ Amazon Startup - Austin, TX - 9/11/2008Splunk @ Amazon Startup - Austin, TX - 9/11/2008
Splunk @ Amazon Startup - Austin, TX - 9/11/2008Michael Wilde
 
Splunk 5 Overview Analyst v1.0
Splunk 5 Overview Analyst v1.0Splunk 5 Overview Analyst v1.0
Splunk 5 Overview Analyst v1.0Splunk
 
SplunkLive! München 2016 - Splunk für IT Operations
SplunkLive! München 2016 - Splunk für IT OperationsSplunkLive! München 2016 - Splunk für IT Operations
SplunkLive! München 2016 - Splunk für IT OperationsSplunk
 
Intel And Big Data: An Open Platform for Next-Gen Analytics
Intel And Big Data: An Open Platform for Next-Gen AnalyticsIntel And Big Data: An Open Platform for Next-Gen Analytics
Intel And Big Data: An Open Platform for Next-Gen AnalyticsIntel IT Center
 
Getting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionGetting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionSplunk
 
Paris live eddiesatterly_022013
Paris live eddiesatterly_022013Paris live eddiesatterly_022013
Paris live eddiesatterly_022013jenny_splunk
 
2012 10 bigdata_overview
2012 10 bigdata_overview2012 10 bigdata_overview
2012 10 bigdata_overviewjdijcks
 
Big Data launch Singapore Patrick Buddenbaum
Big Data launch Singapore Patrick BuddenbaumBig Data launch Singapore Patrick Buddenbaum
Big Data launch Singapore Patrick BuddenbaumIntelAPAC
 

Ähnlich wie dlux - Splunk Technical Overview (20)

SplunkLive: New Visibility=New Opportunity: How IT Can Drive Business Value
SplunkLive: New Visibility=New Opportunity: How IT Can Drive Business Value SplunkLive: New Visibility=New Opportunity: How IT Can Drive Business Value
SplunkLive: New Visibility=New Opportunity: How IT Can Drive Business Value
 
SplunkLive! Toronto - Ceryx
SplunkLive! Toronto - CeryxSplunkLive! Toronto - Ceryx
SplunkLive! Toronto - Ceryx
 
SplunkLive! Detroit April 2013 - Domino's Pizza
SplunkLive! Detroit April 2013 - Domino's PizzaSplunkLive! Detroit April 2013 - Domino's Pizza
SplunkLive! Detroit April 2013 - Domino's Pizza
 
Splunk sales presentation
Splunk sales presentationSplunk sales presentation
Splunk sales presentation
 
How a Cloud Computing Provider Reached the Holy Grail of Visibility
How a Cloud Computing Provider Reached the Holy Grail of VisibilityHow a Cloud Computing Provider Reached the Holy Grail of Visibility
How a Cloud Computing Provider Reached the Holy Grail of Visibility
 
Splunk FISMA for Continuous Monitoring
Splunk FISMA for Continuous Monitoring Splunk FISMA for Continuous Monitoring
Splunk FISMA for Continuous Monitoring
 
Implementing Big Data at the Speed of Business
Implementing Big Data at the Speed of BusinessImplementing Big Data at the Speed of Business
Implementing Big Data at the Speed of Business
 
Don't Re-write Code to Get Better Analytics
Don't Re-write Code to Get Better AnalyticsDon't Re-write Code to Get Better Analytics
Don't Re-write Code to Get Better Analytics
 
dlux splunk>live! 2012 Beginners Session
dlux splunk>live! 2012 Beginners Sessiondlux splunk>live! 2012 Beginners Session
dlux splunk>live! 2012 Beginners Session
 
SplunkLive! Denver - Nov 2012 - Interac
SplunkLive! Denver - Nov 2012 - InteracSplunkLive! Denver - Nov 2012 - Interac
SplunkLive! Denver - Nov 2012 - Interac
 
Big Data launch keynote Singapore Patrick Buddenbaum
Big Data launch keynote Singapore Patrick BuddenbaumBig Data launch keynote Singapore Patrick Buddenbaum
Big Data launch keynote Singapore Patrick Buddenbaum
 
Splunk at Expedia - Gartner Symposium
Splunk at Expedia - Gartner SymposiumSplunk at Expedia - Gartner Symposium
Splunk at Expedia - Gartner Symposium
 
Splunk @ Amazon Startup - Austin, TX - 9/11/2008
Splunk @ Amazon Startup - Austin, TX - 9/11/2008Splunk @ Amazon Startup - Austin, TX - 9/11/2008
Splunk @ Amazon Startup - Austin, TX - 9/11/2008
 
Splunk 5 Overview Analyst v1.0
Splunk 5 Overview Analyst v1.0Splunk 5 Overview Analyst v1.0
Splunk 5 Overview Analyst v1.0
 
SplunkLive! München 2016 - Splunk für IT Operations
SplunkLive! München 2016 - Splunk für IT OperationsSplunkLive! München 2016 - Splunk für IT Operations
SplunkLive! München 2016 - Splunk für IT Operations
 
Intel And Big Data: An Open Platform for Next-Gen Analytics
Intel And Big Data: An Open Platform for Next-Gen AnalyticsIntel And Big Data: An Open Platform for Next-Gen Analytics
Intel And Big Data: An Open Platform for Next-Gen Analytics
 
Getting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionGetting Started with Splunk Breakout Session
Getting Started with Splunk Breakout Session
 
Paris live eddiesatterly_022013
Paris live eddiesatterly_022013Paris live eddiesatterly_022013
Paris live eddiesatterly_022013
 
2012 10 bigdata_overview
2012 10 bigdata_overview2012 10 bigdata_overview
2012 10 bigdata_overview
 
Big Data launch Singapore Patrick Buddenbaum
Big Data launch Singapore Patrick BuddenbaumBig Data launch Singapore Patrick Buddenbaum
Big Data launch Singapore Patrick Buddenbaum
 

Kürzlich hochgeladen

React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 

Kürzlich hochgeladen (20)

React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 

dlux - Splunk Technical Overview

  • 1. splunk> Overview Your Guide David Lutz
  • 2. splunk> Lunch’n Learn Agenda splunk> Overview splunk> Public Assets · What is splunk>? · Splunkbase (splunk> repository of · Use cases over 200 free applications) · Architecture · Answers – community-driven Q&A Using splunk> · Online Documentation · Installation and setup (v4.3) · Enterprise and Global Support · Adding data splunk> App demo · Search with keywords, boolean · A demonstration of the splunk> for operators and statistical commands Application Management App and more · Alerts, reports, and dashboards Copyright © 2011, Splunk Inc. 2 Listen to your data.
  • 3. Agenda What is Splunk? splunk> explained Searching, Alerting & Reporting explained Universal Indexing explained Deployment Options explained Demonstration Copyright © 2011, Splunk Inc. 3 Listen to your data.
  • 4. What is it? Copyright © 2011, Splunk Inc. 4 Listen to your data.
  • 5. Collects, indexes and harnesses your machine data to identify problems, patterns, risks and opportunities and drive better decisions for IT and the business. Copyright © 2011, Splunk Inc. 5 Listen to your data.
  • 6. Wait. What? Copyright © 2011, Splunk Inc. 6 Listen to your data.
  • 7. splunk> is software splunk> creates a key : value index splunk> retains pristine copies of all data splunk> searches that index for data Copyright © 2011, Splunk Inc. 7 Listen to your data.
  • 8. splunk> is the engine for machine data No predefined schema, no custom connectors, no RDBMS, no need to filter/forward. Customer Outside the Facing Data Datacenter Click-stream data Manufacturing, logistic Shopping cart data s… Online transaction CDRs & IPDRs data Power consumption Logfiles Configs Messages Traps Metrics Scripts Changes Tickets RFID data Alerts GPS data Virtualization Windows Linux/Unix Applications Databases Networking & Cloud Registry Configurations Hypervisor Web logs Configurations Configurations Event logs syslog Guest OS, Apps Log4J, JMS, JMX Audit/query logs syslog File system File system Cloud .NET events Tables SNMP sysinternals ps, iostat, top Code and scripts Schemas netflow Copyright © 2011, Splunk Inc. 11 Listen to your data.
  • 9. splunk> eliminates finger pointing Copyright © 2011, Splunk Inc. 13 Listen to your data.
  • 10. What It’s Like In The Trenches Application Application Systems Application Database Service Desk Support Developer Administrator Developer Administrator Log call. The Java monitoring Stop working on Stop what they’re Manual DBA analyzes console says tools don’t show new code to doing to identify investigation audit logs which everything is anything either. troubleshoot. and gather establishes not points to bad green. Call the Need production production logs application query. developer. logs! for developer. problem. Escalate. Escalate. Escalate. Respond. Escalate. Now what? Copyright © 2011, Splunk Inc. 14 Listen to your data.
  • 11. Harnessing Your Machine Data Proactive Search and Investigate, find and fix problems dramatically Investigate faster across your organization IT silo chaos Reactive Copyright © 2011, Splunk Inc. 15 Listen to your data.
  • 12. Harnessing Your Machine Data Proactive Search and Investigate, find and fix problems dramatically Investigate faster across your organization IT silo chaos Reactive Copyright © 2011, Splunk Inc. 16 Listen to your data.
  • 13. Harnessing Your Machine Data Proactive Automatically monitor to identify issues, Proactive Monitoring problems and attacks before they impact your customers and services Search and Investigate IT silo chaos Reactive Copyright © 2011, Splunk Inc. 18 Listen to your data.
  • 14. Harnessing Your Machine Data Proactive Automatically monitor to identify issues, Proactive Monitoring problems and attacks before they impact your customers and services Search and Investigate IT silo chaos Reactive Copyright © 2011, Splunk Inc. 19 Listen to your data.
  • 15. Harnessing Your Machine Data Proactive Gain end-to-end visibility to track and deliver on Operational IT KPIs and make better-informed IT decisions Visibility Proactive Monitoring Search and Investigate IT silo chaos Reactive Copyright © 2011, Splunk Inc. 21 Listen to your data.
  • 16. Harnessing Your Machine Data Proactive Gain end-to-end visibility to track and deliver on Operational IT KPIs and make better-informed IT decisions Visibility Proactive Monitoring Search and Investigate IT silo chaos Reactive Copyright © 2011, Splunk Inc. 22 Listen to your data.
  • 17. Harnessing Your Machine Data Proactive Gain real-time insight from operational data to Real-time make better-informed business decisions Business Insights Operational Visibility Proactive Monitoring Search and Investigate IT silo chaos Reactive Copyright © 2011, Splunk Inc. 23 Listen to your data.
  • 18. Harnessing Your Machine Data Proactive Gain real-time insight from operational data to Real-time make better-informed business decisions Business Insights Operational Visibility Proactive Monitoring Search and Investigate IT silo chaos Reactive Copyright © 2011, Splunk Inc. 24 Listen to your data.
  • 19. splunk> Supports Diverse Apps/Solutions CDR Security IronPort WSA Copyright © 2011, Splunk Inc. Listen to your data.
  • 21. Universal Indexing Indexes Unstructured Data It’s that simple. key : value Copyright © 2011, Splunk Inc. 27 Listen to your data.
  • 22. Universal Indexing Indexes Unstructured Data Every word Every value Every character … even punctuation … even white spaces Copyright © 2011, Splunk Inc. 28 Listen to your data.
  • 23. New Approach to Heterogeneous Data Universal Indexing Search-time Knowledge Flexibility and Fast Time to Value • No data normalization • Knowledge applied at • Normalization as it’s • Automatically handles search-time needed timestamps • No brittle schema to • Faster implementation • Parsers not required work around • Easy search language • Index every term & • Multiple views into the • Multiple views into the pattern “blindly” same data same data • No attempt to • Splunk helps find “understand” up front transactions, patterns and trends Copyright © 2011, Splunk Inc. 29 Listen to your data.
  • 25. A splunk> Installation Has 4 Functions Searching and Reporting (Search Head) Indexing and Search Services (Indexer) Data Collection and Forwarding (Forwarder) Local and Distributed Management (Deployment Server) A splunk> installation can be one or all of these … Copyright © 2011, Splunk Inc. 35 Listen to your data.
  • 26. Single splunk> Indexer Get started with a single splunk> Indexer. You can index, search, alert, report, correlate within 15 minutes. Send in syslog data Pull in local data via File or Dir monitoring, WMI, and/or Scripted Inputs Servers & Desktops Logs Scripts Firewalls, Routers, Switches Messages Copyright © 2011, Splunk Inc. 36 Listen to your data.
  • 27. splunk> Indexer with Forwarders splunk> Forwarders can be used to send data to your splunk> Indexer reliably and securely Copyright © 2011, Splunk Inc. 37 Listen to your data.
  • 28. splunk> Scales Across the Datacenter Offload search with dedicated splunk> Search Head(s) Auto load-balanced forwarding to as many splunk> Indexers as you need to index, up to TBs/day Send data from 1,000s of servers using combination of splunk> Forwarders, syslog, WMI, message queues, or other remote protocols Copyright © 2011, Splunk Inc. 38 Listen to your data.
  • 29. splunk> Runs Across Datacenters Distributed search unifies the view across locations Role-based access controls how far a given user's search will span Copyright © 2011, Splunk Inc. 39 Listen to your data.
  • 30. splunk> Scales to TBs/day and 1,000s of Users Distributed Search with MapReduce linearly scales search and reporting Automatic load balancing linearly scales indexing Copyright © 2011, Splunk Inc. 40 Listen to your data.
  • 33. Remember ‘Harnessing Your Machine Data’? Proactive Gain real-time insight from operational data to Real-time make better-informed business decisions Business Insights Gain end-to-end visibility to track and deliver on Operational IT KPIs and make better-informed IT decisions Visibility Reactive Copyright © 2011, Splunk Inc. 45 Listen to your data.
  • 34. Harnessing Your Machine Data Proactive Gain real-time insight from operational data to Real-time make better-informed business decisions Business Insights Operational Visibility Proactive Monitoring Search and Investigate IT silo chaos Reactive Copyright © 2011, Splunk Inc. 46 Listen to your data.
  • 35. Harnessing Your Machine Data Proactive Gain end-to-end visibility to track and deliver on Operational IT KPIs and make better-informed IT decisions Visibility Proactive Monitoring Search and Investigate IT silo chaos Reactive Copyright © 2011, Splunk Inc. 47 Listen to your data.
  • 37. Is There A Problem? Copyright © 2011, Splunk Inc. 49 Listen to your data.
  • 38. Where Is The Problem? Copyright © 2011, Splunk Inc. 50 Listen to your data.
  • 39. What Is The Problem? Copyright © 2011, Splunk Inc. 51 Listen to your data.
  • 40. Remember ‘Harnessing Your Machine Data’? Proactive Search and Investigate, find and fix problems dramatically Investigate faster across your organization IT silo chaos Reactive Copyright © 2011, Splunk Inc. 52 Listen to your data.
  • 41. The IT Search Company email: dlux@splunk.com twitter: @dlux_at_splunk skype: dluxatsplunkdotcom Your Guide David Lutz Copyright © 2011, Splunk Inc. Listen to your data.

Hinweis der Redaktion

  1. Note: this presentation is updated often. Please look for updates in the Partner Portal.
  2. How long this is going to takeOverview of Approach, TechnologyLots of evaluators of Splunk are on this call and are curious on how to deploy the tool. Me using Splunk in many different waysQ&A at the end of the session. If questions come up during the presentation then type them in the Q&A or Chat box.
  3. Machine data is an incredibly valuable resource, but organizations rarely get the value they need from it. Existing data analysis, management and monitoring solutions are simply not engineered for this type of data.Take Information Management. Data Warehouses and Relational Database Management Systems are based on rigid schemas and designed for structured, consistent data. They provide historical analysis but not real-time visibility. Enterprise Search is designed for human-generated data, such as documents and Web pages. This data is very different to machine data, which has an order of magnitude more in scale and diversity.IT Management tools and Security Information and Event Management on the other hand are siloed and designed for one level of the organization. They provide a narrow view of the underlying data and are hard-wired for specific data types and sources. Or they monitor across systems, with serious gaps in the data they collect. They also don’t provide any historical context.The fact is finding a better way to sift, distill and understand the vast amounts of machine data can transform how IT organizations manage,secure and audit IT. It can also provide valuable insights for the business on trends and behaviors of their customers and services.We call this gaining Operational Intelligence.
  4. Machine data is an incredibly valuable resource, but organizations rarely get the value they need from it. Existing data analysis, management and monitoring solutions are simply not engineered for this type of data.Take Information Management. Data Warehouses and Relational Database Management Systems are based on rigid schemas and designed for structured, consistent data. They provide historical analysis but not real-time visibility. Enterprise Search is designed for human-generated data, such as documents and Web pages. This data is very different to machine data, which has an order of magnitude more in scale and diversity.IT Management tools and Security Information and Event Management on the other hand are siloed and designed for one level of the organization. They provide a narrow view of the underlying data and are hard-wired for specific data types and sources. Or they monitor across systems, with serious gaps in the data they collect. They also don’t provide any historical context.The fact is finding a better way to sift, distill and understand the vast amounts of machine data can transform how IT organizations manage,secure and audit IT. It can also provide valuable insights for the business on trends and behaviors of their customers and services.We call this gaining Operational Intelligence.
  5. Machine data is an incredibly valuable resource, but organizations rarely get the value they need from it. Existing data analysis, management and monitoring solutions are simply not engineered for this type of data.Take Information Management. Data Warehouses and Relational Database Management Systems are based on rigid schemas and designed for structured, consistent data. They provide historical analysis but not real-time visibility. Enterprise Search is designed for human-generated data, such as documents and Web pages. This data is very different to machine data, which has an order of magnitude more in scale and diversity.IT Management tools and Security Information and Event Management on the other hand are siloed and designed for one level of the organization. They provide a narrow view of the underlying data and are hard-wired for specific data types and sources. Or they monitor across systems, with serious gaps in the data they collect. They also don’t provide any historical context.The fact is finding a better way to sift, distill and understand the vast amounts of machine data can transform how IT organizations manage,secure and audit IT. It can also provide valuable insights for the business on trends and behaviors of their customers and services.We call this gaining Operational Intelligence.
  6. Machine data is an incredibly valuable resource, but organizations rarely get the value they need from it. Existing data analysis, management and monitoring solutions are simply not engineered for this type of data.Take Information Management. Data Warehouses and Relational Database Management Systems are based on rigid schemas and designed for structured, consistent data. They provide historical analysis but not real-time visibility. Enterprise Search is designed for human-generated data, such as documents and Web pages. This data is very different to machine data, which has an order of magnitude more in scale and diversity.IT Management tools and Security Information and Event Management on the other hand are siloed and designed for one level of the organization. They provide a narrow view of the underlying data and are hard-wired for specific data types and sources. Or they monitor across systems, with serious gaps in the data they collect. They also don’t provide any historical context.The fact is finding a better way to sift, distill and understand the vast amounts of machine data can transform how IT organizations manage,secure and audit IT. It can also provide valuable insights for the business on trends and behaviors of their customers and services.We call this gaining Operational Intelligence.
  7. Splunk is the engine for machine data. It can take any machine data and automatically index it for fast searching. Because Splunk doesn’t use a database, there are no additional licenses, and most importantly, no pre-defined schema to limit how you use your information. For data that isn’t already in a text-based format, such as data locked up in APIs and databases, Splunk offers many free connectors to attach and retrieve that data from other systems. Examples include the Windows registry and WMI. But the most important thing to note is how easy it is to get data into Splunk and make it useful. So even if you have a custom app with custom formats, Splunk can make sense of it. Over time, IT has developed as “silos” of systems, focused on specific technologies, functions, departments, groups of systems and people, etc. As a consequence, IT ends up being managed as silos, with narrow, focused tools that provided a limited view of what’s really going on. What’s more, all IT systems in these silos generate data. This machine data or “exhaust” contains a categorical record of behavior – behavior of customers, user transactions, networks, servers, applications, and more. This data helps diagnose and fix issues, but is also a source of critical intelligence for the business.Even purported, “Single Panes of Glass”, like SIEMs, Application Performance Management, Event Correlation and Analysis systems and Data Warehouses, don’t provide the complete picture, because they aren’t designed for the full scope of this data.Today’s IT management tools, security solutions and even business intelligence systems are NOT designed to leverage the full scope of machine data. Data which is non-standard, unstructured, high volume and generated every millisecond of every day.Machine data used to be called log files. Syslog data from networks, web log data from web servers Lots of different sources of data Customer facing data such as cloud services. Challenge with machine data is: volume is growing exponentially vast number of sources none of it is the same
  8. Reinforce points from previous slide.
  9. Data is spread out everywhere, and getting it all to one place is often harder than expected. Splunk helps make that job easy, with both agent-less data gathering, and Splunk forwarders. Splunk forwarders collect, process, and forward data to a central Splunk indexer. Forwarders can be load-balanced, are fault tolerant and centrally managed by either Splunk’s Deployment Server or your own config management system, and come in several footprint options.
  10. Splunk is a data engine for your machine data. It gives you real-time visibility and intelligence into what’s happening across your IT infrastructure – whether it’s physical, virtual or in the cloud. Everybody now recognizes the value of this data, the problem up to now has been getting to it. At Splunk we applied the search engine paradigm to being able to rapidly harness any and all machine data wherever it originates. The “no predefined schema” design, means you can point Splunk at any of your data, regardless of format, source or location. There is no need to build custom parsers or connectors, there’s no traditional RDBMS, there’s no need to filter and forward.Here we see just a sample of the kinds of data Splunk can ‘eat’.Reminder – what’s the ‘big deal’ about machine data? It holds a categorical record of the following:User transactionsCustomer behaviorMachine behaviorSecurity threatsFraudulent activityYou can imagine that a single user transaction can span many systems and sources of this data, or a single service relies on many underlying systems. Splunk gives you one place to search, report on, analyze and visualize all this data.Data is coming from everywhere. Log files, network equipment, transactions, statistics. As soon as a machine is turned on it sends data. VMWare, Amazon, Rightscale, shipping systems. Unique about Splunk. Came out of the world of Yahoo and search engines. All the lights are green but the web-site is still having problems. Engineers came out of environments without any pre-defined data types or db schemas. Time series engine that indexes data. Don’t need to parse or modify the data. I will show you how easy it is to get intelligence out of your data from Splunk. Splunk is a data engine for your machine data. It gives you real-time visibility and intelligence into what’s happening across your IT infrastructure – whether it’s physical, virtual or in the cloud. Everybody now recognizes the value of this data, the problem up to now has been getting to it. Here we see just a sample of the kinds of data Splunk can ‘eat’.Reminder – what’s the ‘big deal’ about machine data? It holds a categorical record of the following:User transactionsCustomer behaviorMachine behaviorSecurity threatsFraudulent activityYou can imagine that a single user transaction can span many systems and sources of this data, or a single service relies on many underlying systems. Splunk gives you one place to search, report on, analyze and visualize all this data.
  11. To deliver Operational Intelligence requires handling three primary workloads from within the same system.Providing real-time visibility of live data, including correlating transactions and events across multiple sources, monitoring against thresholds and alerting, tracking against SLAs, etc.Enabling powerful navigation of the data to get to “the needle in the haystack” – to troubleshoot and identify root cause and to perform incident investigations.Providing the ability to analyze historical (as well as live streaming) data – to identify trends and patterns, to prove compliance, etc.Supporting these three workloads in the same system delivers value across the organization. Specific dashboards can provide meaningful information for different users and roles – from the server room to the boardroom, so the value of Operational Intelligence can be recognized deep within the organization.
  12. What this means for somebody “in the trenches”, for example, troubleshooting an application issue?Customer calls service desk – service desk logs calls and escalates (red light/green light, everything looks green)Escalated to App support – looks at java monitoring tools and everything looks fine because rely on instrumentation; but no access to logs!Developer gets pulled in and has to stop working on new codeNeeds to ask sysadmin for logsDeveloper establishes not his problem, escalate to DB guyDB guy looks at audit logs and points to bad query We call this “human latency” and customers we talk to say it can consume hours or sometimes days of previous time when issues occur! Wouldn’t it be great if all this went away?
  13. So what does “harnessing your machine data” practically translate to for your organization?From working closely with customers successfully harnessing their machine data, we think in terms of an “operational intelligence” maturity model with 4 stages. Stage 0, is IT silo chaos and we say that to impress upon the fact that there really is a lot of sources of data in non-standard formats.Stage 1 is “search and investigate” and it’s using the data to quickly find and fix problems across IT silos and systems, or finding that “needle in the haystack”, or “multiple needles in multiple haystacks”. In other words “fix IT”.By effectively harnessing this data, customers have experienced up to 70% improvements in mean time to identify and resolve issues. This alone removes much of the human latency experienced “in the trenches”.Moving up the path from reactive to proactive. Search and InvestigateDownload and start searching and investigating. The interface would look like this. Search bar for entering errors. Proactive MonitoringI want alert when issues are happening. Interface that shows my alerts. Alerts might be sent up to a higher level console. Operational VisibilityInformation on systems from a business standpoint. Which applications are working? SLA infractions. Real Time Business InsightsCombining machine data with pricing data. Executive might have a single widget on their internal wiki that shows SLA or Revenue information.
  14. So what does “harnessing your machine data” practically translate to for your organization?From working closely with customers successfully harnessing their machine data, we think in terms of an “operational intelligence” maturity model with 4 stages. Stage 0, is IT silo chaos and we say that to impress upon the fact that there really is a lot of sources of data in non-standard formats.Stage 1 is “search and investigate” and it’s using the data to quickly find and fix problems across IT silos and systems, or finding that “needle in the haystack”, or “multiple needles in multiple haystacks”. In other words “fix IT”.By effectively harnessing this data, customers have experienced up to 70% improvements in mean time to identify and resolve issues. This alone removes much of the human latency experienced “in the trenches”.
  15. Stage 2 is about starting to get more proactive by automatically monitor your infrastructure to identify issues, problems and attacks before they impact your customers and services. In other words, “better run IT”.By monitoring trends and thresholds across a wider scope of data, customers experiencing finding problems way before they impact customers and services, or before they cause pain. Systems that used to experience outage have remained running because of implementation of this approach.
  16. Stage 2 is about starting to get more proactive by automatically monitor your infrastructure to identify issues, problems and attacks before they impact your customers and services. In other words, “better run IT”.By monitoring trends and thresholds across a wider scope of data, customers experiencing finding problems way before they impact customers and services, or before they cause pain. Systems that used to experience outage have remained running because of implementation of this approach.
  17. Stage 3 is about gaining end-to-end visibility to track and deliver on IT KPIs and make better-informed IT decisions. In other words, “managing IT as a business”.Rolling up visibility to align it to IT KPIs (how IT is measured by the business) provides unprecedented intelligence to the NOC and senior IT personnel. Being able to spot SLA infractions in real time, or measure utilization as new services are launched enables IT to meet and exceed its objectives.
  18. Stage 3 is about gaining end-to-end visibility to track and deliver on IT KPIs and make better-informed IT decisions. In other words, “managing IT as a business”.Rolling up visibility to align it to IT KPIs (how IT is measured by the business) provides unprecedented intelligence to the NOC and senior IT personnel. Being able to spot SLA infractions in real time, or measure utilization as new services are launched enables IT to meet and exceed its objectives.
  19. Finally, stage 4 is about delivering real-time business insight - gain real-time insight from operational data to make better-informed business decision. In other words, “transforming business decisions”.Combining and correlating machine data with business data provides unique business insights. Watching the consumption of new online services by channel or demographics. Combining telecoms call records with tariff databases to get a real time view of revenue and 3rd party charges. There is a diverse set of cases where surfacing machine data provides operational intelligence to the business. And the lead times to get to this intelligence is dramatically less than other solutions. Months to a few days in many cases.
  20. Finally, stage 4 is about delivering real-time business insight - gain real-time insight from operational data to make better-informed business decision. In other words, “transforming business decisions”.Combining and correlating machine data with business data provides unique business insights. Watching the consumption of new online services by channel or demographics. Combining telecoms call records with tariff databases to get a real time view of revenue and 3rd party charges. There is a diverse set of cases where surfacing machine data provides operational intelligence to the business. And the lead times to get to this intelligence is dramatically less than other solutions. Months to a few days in many cases.
  21. Splunkbase is the home for our Splunk Apps. There, you'll find cool and useful downloads to extend Splunk. You can share what you make, from simple add-ons with a useful search, script, or report to full-fledged apps with multiple views. You’ll also find Apps from Splunk and our partners.Apps are being created all the time, so bookmark the site and check in frequently.Examples on this page include Apps for Cisco, F5, Twitter sentiment, external ‘WHOIS’ lookups, license usage, and more.Vendors, customers, Splunk Business Development create solutions that customers can easily start taking advantage of. Most of them are out on the community and they are free. Built on the knowledge of Splunk.
  22. Note: this presentation is updated often. Please look for updates in the Partner Portal.
  23. Machine data is an incredibly valuable resource, but organizations rarely get the value they need from it. Existing data analysis, management and monitoring solutions are simply not engineered for this type of data.Take Information Management. Data Warehouses and Relational Database Management Systems are based on rigid schemas and designed for structured, consistent data. They provide historical analysis but not real-time visibility. Enterprise Search is designed for human-generated data, such as documents and Web pages. This data is very different to machine data, which has an order of magnitude more in scale and diversity.IT Management tools and Security Information and Event Management on the other hand are siloed and designed for one level of the organization. They provide a narrow view of the underlying data and are hard-wired for specific data types and sources. Or they monitor across systems, with serious gaps in the data they collect. They also don’t provide any historical context.The fact is finding a better way to sift, distill and understand the vast amounts of machine data can transform how IT organizations manage,secure and audit IT. It can also provide valuable insights for the business on trends and behaviors of their customers and services.We call this gaining Operational Intelligence.
  24. Machine data is an incredibly valuable resource, but organizations rarely get the value they need from it. Existing data analysis, management and monitoring solutions are simply not engineered for this type of data.Take Information Management. Data Warehouses and Relational Database Management Systems are based on rigid schemas and designed for structured, consistent data. They provide historical analysis but not real-time visibility. Enterprise Search is designed for human-generated data, such as documents and Web pages. This data is very different to machine data, which has an order of magnitude more in scale and diversity.IT Management tools and Security Information and Event Management on the other hand are siloed and designed for one level of the organization. They provide a narrow view of the underlying data and are hard-wired for specific data types and sources. Or they monitor across systems, with serious gaps in the data they collect. They also don’t provide any historical context.The fact is finding a better way to sift, distill and understand the vast amounts of machine data can transform how IT organizations manage,secure and audit IT. It can also provide valuable insights for the business on trends and behaviors of their customers and services.We call this gaining Operational Intelligence.
  25. Data normalization – it’s hard to let go of. For decades we’ve been taking information and chopping it into rows and columns, and then looking up the data by referencing those like a virtual address. Unfortunately, with the radical increase in machine-generated data around most organizations, there aren’t enough skilled people to define how that data should be handled. Like how search overtook directories in how we navigate the Internet, search is the only way to handle so much data, in so many formats, and subject to change without notice. Universal indexing is a way of handling text based, time series data. Those are the only limitations for Splunk – the data must be text based (or converted into text) and must be orderable into a series. From there, Splunk handles the rest. It finds most timestamps (or creates one), breaks up the raw data stream into discrete events and retains the original data in a compressed form on disk. No normalization, no modification, just a flat-file index on top of the original, now compressed, data. Search is where the data is customized for how you want to visualize your IT information. At search time, fields are extracted that can be used like database ‘columns’ to pivot data. If you don’t like the fields Splunk finds, define your own with the graphical field extractor. Then you can create relationships between the rows, using event types to name certain kinds of events for easy aggregation and searching, or define transactions that tie events from multiple systems together into a logical structure. With that limited and easy-to-create structure, you can find almost any data or pattern across petabytes of information directly from the web UI, without mastering SQL or statistical query languages. Best of all, it’s data your way. Don’t like your search or your schema? Just rewrite or delete it – the data is unchanged. Any user can pivot their lens onto the underlying data without affecting others – unless, of course, they choose to share their knowledge through apps and shared searches.
  26. Note: this presentation is updated often. Please look for updates in the Partner Portal.
  27. Splunk can be divided into four logical functions. First, from the bottom up, is forwarding. Splunk forwarders come in two packages; the full Splunk distribution or a dedicated “Universal Forwarder”. The full Splunk distribution can be configured to filter data before transmitting, execute scripts locally, or run SplunkWeb. This gives you several options depending on the footprint size your endpoints can tolerate. The universal forwarder is an ultra-lightweight agent designed to collect data in the smallest possible footprint. Both flavors of forwarder come with automatic load balancing, SSL encryption and data compression, and the ability to route data to multiple Splunk instances or third party systems. To manage your distributed Splunk environment, there is the Deployment Server. Deployment server helps you synchronize the configuration of your search heads during distributed searching, as well as your forwarders to centrally manage your distributed data collection. Of course, Splunk has a simple flat-file configuration system, so feel free to use your own config management tools if your more comfortable with what you already have. The core of the Splunk infrastructure is indexing. An indexer does two things – it accepts and processes new data, adding it to the index and compressing it on disk. The indexer also services search requests, looking through the data it has via it’s indices and returning the appropriate results to the searcher over a compressed communication channel. Indexers scale out almost limitlessly and with almost no degradation in overall performance, allowing Splunk to scale from single-instance small deployments to truly massive Big Data challenges. Finally, the Splunk most users see is the search head. This is the webserver and app interpreting engine that provides the primary, web-based user interface. Since most of the data interpretation happens as-needed at search time, the role of the search head is to translate user and app requests into actionable searches for it’s indexer(s) and display the results. The Splunk web UI is highly customizable, either through our own view and app system, or by embedding Splunk searches in your own web apps via includes or our API.
  28. Splunk scales linearly and scales to big data deployments across commodity servers thanks to a MapReduce-based architecture (scalability architecture made popular by Google). A single Splunk indexer can index hundreds of gigabytes per day depending the data sources and load from searchingIf you have terabytes a day you can linearly scale a single, logical Splunk deployment by adding index servers, using Splunk’s built in forwarder load balancing to distribute the data and using distributed search to provide a single view across all of these servers. Unlike some log management products you get full consolidated reporting and alerting not simply merged query results. We provide a rich set of benchmarking tools and recommend using them to get the indexing throughput and compression rate on your particular data in your target configuration.And of course, if customers or you are not sure how much data you need to index, you can set up a test deployment with a trial license and use Splunk itself to measure how much data you’re indexing.Single splunk server called an indexer.Might be sending syslog data from a port or Windows event log data either locally or remotely.
  29. Splunk scales linearly and scales to big data deployments across commodity servers thanks to a MapReduce-based architecture (scalability architecture made popular by Google). A single Splunk indexer can index hundreds of gigabytes per day depending the data sources and load from searchingIf you have terabytes a day you can linearly scale a single, logical Splunk deployment by adding index servers, using Splunk’s built in forwarder load balancing to distribute the data and using distributed search to provide a single view across all of these servers. Unlike some log management products you get full consolidated reporting and alerting not simply merged query results. We provide a rich set of benchmarking tools and recommend using them to get the indexing throughput and compression rate on your particular data in your target configuration.And of course, if customers or you are not sure how much data you need to index, you can set up a test deployment with a trial license and use Splunk itself to measure how much data you’re indexing.
  30. Splunk scales linearly and scales to big data deployments across commodity servers thanks to a MapReduce-based architecture (scalability architecture made popular by Google). A single Splunk indexer can index hundreds of gigabytes per day depending the data sources and load from searchingIf you have terabytes a day you can linearly scale a single, logical Splunk deployment by adding index servers, using Splunk’s built in forwarder load balancing to distribute the data and using distributed search to provide a single view across all of these servers. Unlike some log management products you get full consolidated reporting and alerting not simply merged query results. We provide a rich set of benchmarking tools and recommend using them to get the indexing throughput and compression rate on your particular data in your target configuration.And of course, if customers or you are not sure how much data you need to index, you can set up a test deployment with a trial license and use Splunk itself to measure how much data you’re indexing.During your evaluation you might be indexing over 100GB of data per day. You can deploy multiple indexers to handle the load. You might need to deploy indexers to different data centers.
  31. Splunk can not only distribute the data collection challenge, but also search tasks as well. To achieve massive scale, as well as meeting data segmentation requirements, Splunk can distribute searches from a single Splunk searcher to any number of Splunk indexers. These indexers can all be local for massive parallelization for Big Data problems, or spread across a global enterprise to help you keep data wherever makes the most sense for your network and security requirements.
  32. Splunk allows you divide up the work of search and indexing across as many servers as you need to achieve the performance and scale you require. Using work dividing techniques such as MapReduce, Splunk can take a single search and query as many indexers as you need to complete the job, allowing you to use inexpensive commodity hardware in massively parallel clusters. For example, if you had 1 million events to search, one Indexer can easily complete that search. But it will take a little time – let’s say 30 seconds. However, if the same million events was spread across 10 indexers, the same search would complete in 3 seconds. How fast and how large you want your searches is yours to control by adding indexers as desired.
  33. Note: this presentation is updated often. Please look for updates in the Partner Portal.
  34. Splunk is a different kind of company with a different kind of product. Our technology is built by IT pros for IT pros to be software people will want to use, from novice to guru. The product features one code base and package, regardless of how it’s deployed. Splunk is standards-based and built on an open architecture. In addition Splunk is flexible and extensible allowing you to access any data from any format and provide it for viewing across an organization. The Splunk architecture was designed to scale from a single user to truly massive and distributed global deployments. Splunk doesn’t dumb down or normalize data to fit into a database, potentially removing context. And finally we are easy to work with and provide a transparent support environment. Our documentation is all public, as well as our product roadmap, we even have real engineers on our IRC channel.
  35. Note: this presentation is updated often. Please look for updates in the Partner Portal.
  36. Note: this presentation is updated often. Please look for updates in the Partner Portal.
  37. Finally, stage 4 is about delivering real-time business insight - gain real-time insight from operational data to make better-informed business decision. In other words, “transforming business decisions”.Combining and correlating machine data with business data provides unique business insights. Watching the consumption of new online services by channel or demographics. Combining telecoms call records with tariff databases to get a real time view of revenue and 3rd party charges. There is a diverse set of cases where surfacing machine data provides operational intelligence to the business. And the lead times to get to this intelligence is dramatically less than other solutions. Months to a few days in many cases.
  38. Finally, stage 4 is about delivering real-time business insight - gain real-time insight from operational data to make better-informed business decision. In other words, “transforming business decisions”.Combining and correlating machine data with business data provides unique business insights. Watching the consumption of new online services by channel or demographics. Combining telecoms call records with tariff databases to get a real time view of revenue and 3rd party charges. There is a diverse set of cases where surfacing machine data provides operational intelligence to the business. And the lead times to get to this intelligence is dramatically less than other solutions. Months to a few days in many cases.
  39. Stage 3 is about gaining end-to-end visibility to track and deliver on IT KPIs and make better-informed IT decisions. In other words, “managing IT as a business”.Rolling up visibility to align it to IT KPIs (how IT is measured by the business) provides unprecedented intelligence to the NOC and senior IT personnel. Being able to spot SLA infractions in real time, or measure utilization as new services are launched enables IT to meet and exceed its objectives.
  40. Note: this presentation is updated often. Please look for updates in the Partner Portal.
  41. So what does “harnessing your machine data” practically translate to for your organization?From working closely with customers successfully harnessing their machine data, we think in terms of an “operational intelligence” maturity model with 4 stages. Stage 0, is IT silo chaos and we say that to impress upon the fact that there really is a lot of sources of data in non-standard formats.Stage 1 is “search and investigate” and it’s using the data to quickly find and fix problems across IT silos and systems, or finding that “needle in the haystack”, or “multiple needles in multiple haystacks”. In other words “fix IT”.By effectively harnessing this data, customers have experienced up to 70% improvements in mean time to identify and resolve issues. This alone removes much of the human latency experienced “in the trenches”.